Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
2a01353ed845598a8ae6c22540ffaab7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a01353ed845598a8ae6c22540ffaab7.exe
Resource
win10v2004-20240226-en
General
-
Target
2a01353ed845598a8ae6c22540ffaab7.exe
-
Size
129KB
-
MD5
2a01353ed845598a8ae6c22540ffaab7
-
SHA1
c411fe0c96a36d11e6c2e8fbd24fa0c80459b462
-
SHA256
6176f12d1b765b1003840a310d60e2abe9417c61d61b9dae50684ebbeda1deb0
-
SHA512
870e12eb8e6273f57e2ce219785b86cfd5e972673918b48e5d8f259ffbd835a9e0b69da5baf016204dd32164ed28bf111573474e7d5cb205d7f8cbc60053ecb0
-
SSDEEP
3072:knZjfso0f5z9f57fgDWChiOzl0LEnFvUf4FnWRYCd9:kndp0f5z77fgDNlzl0L0dUf2WRNd9
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2616 nhadrjb.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nhadrjb.exe 2a01353ed845598a8ae6c22540ffaab7.exe File created C:\PROGRA~3\Mozilla\mrcfdgn.dll nhadrjb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2616 2992 taskeng.exe 29 PID 2992 wrote to memory of 2616 2992 taskeng.exe 29 PID 2992 wrote to memory of 2616 2992 taskeng.exe 29 PID 2992 wrote to memory of 2616 2992 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a01353ed845598a8ae6c22540ffaab7.exe"C:\Users\Admin\AppData\Local\Temp\2a01353ed845598a8ae6c22540ffaab7.exe"1⤵
- Drops file in Program Files directory
PID:2904
-
C:\Windows\system32\taskeng.exetaskeng.exe {0039B306-5DC3-43BF-AEBE-C53227C6F71D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\PROGRA~3\Mozilla\nhadrjb.exeC:\PROGRA~3\Mozilla\nhadrjb.exe -giukxrm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD5aacecd981893c607562da64ed03dd83f
SHA1f0a59614fe31cba4bd3179670ca542191c84f69c
SHA2567b525cf9761362298cc35c89324a86d0902a3a1d740369a7c22b8ee68c8d0370
SHA512b7e0d595bbf7633c4036e80c04bd4dbcf3341fbc0365b88282c7fc9da4c68379a397934f798f9cf3dcf245da047c53f13a8550fda278372fcade98183c9de6ed